FacebookTwitterGoogle+RedditEmail

As the Surveillance Expands, Best Way to Resist is to Bury the NSA in Garbage

Word that Yahoo! last year, at the urging of the National Security Agency, secretly developed a program that monitored the mail of all 280 million of its customers and turned over to the NSA all mail from those who used any of the agency’s thousands of keywords, shows that the US has become a total police state in terms of trying to monitor every person in the country (and outside too).

With the courts, especially at the appellate and Supreme Court level, rolling over and supporting this massive evisceration of basic freedoms, including the First Amendment guarantee of freedom of speech and the Fourth Amendment protection against illegal search and seizure and invasion of privacy, perhaps the best way for us to fight back is to overload the spy system. How to do this? Just copy and paste random fragments of the following list (a bit dated, but useable), provided courtesy of the publication Business Insider, and include them in every communication — email, social media, etc. — that you send out.

The secret Yahoo! assault (reported on here by Alfredo Lopez in yesterday’s article), works by searching users’ emails for keywords on an NSA list of suspected words that might be used by alleged terrorists or anti-government activists, and then those suspect communications are forwarded to the NSA, where humans eventually have to separate the wheat from the chaff. Too much chaff (and they surely have too much chaff anyhow!) and they will be buried with work and unable to read anything.

In fact, critics of the government’s metastasizing universal surveillance program, including former FBI agents and other experts, have long criticized the effort to turn the US into a replica of East Germany with its Stazi secret police, cannot work and is actually counter-productive, because with spy agencies’ limited manpower looking at all the false leads provided by keyword monitoring, they are bound to miss the real dangerous messages. In fact, this was also the argument used against the FBI’s program of monitoring mosques and suspecting every Muslim American who expressed criticism of the US. Most are just people saying what a lot of us say: that the US wars in the Middle East are wrong or even criminal, but they are just citizens or immigrants exercising their free speech when they do this, not terrorists, and spying on them is and has been a huge waste or time and resources.

So, to help destroy the continuing and expanding effort to monitor everything we do, here’s a sample of the NSA’s keyword list:

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

***

 You’ll note, if you read through it, that the list itself is doing the job of overburdening the NSA’s staff. By including such commonly used words as flu, package, face, niche, package, credit card, fraud, basement, veggie (!), president, freedom (!), bank and Armani, they assure that there will be endless piles of communications that are completely innocuous that will have to be first read and examined for signs of terrorism. You’ll note too that there are some keywords that are even misspelled, meaning that the real words will be missed, for example: assassinate, priavacy(!), Secert Service and Hillal (is that supposed to be halal or Hillel I wonder?).

It’s also interesting to discover among the incriminating words that the NSA thinks might be used by potential “terrorists,” peculiar words like: freedom, veggie, sardine, Standford (sic), advisors, halibut, fish, Bubba the Love Sponge (really!), Playboy, dictionary and Zen (I’m sure there’s a great SNL skit in the works featuring a gang of Zen practitioners plotting their first terrorist action!).

Anyhow, have fun reading the list and selecting some of these choice keywords to sprinkling into your communications. Or you could just use them as a tag line to your emails, the way some people add inspirational sayings from the likes of Ben Franklin or Albert Einstein. Since the keyword list is so inclusive, you’re probably having your mail reviewed anyway, but why not make sure it is, just to keep the NSA occupied.

More articles by:

Dave Lindorff is a founding member of ThisCantBeHappening!, an online newspaper collective, and is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press).

February 18, 2019
Elliot Sperber
Greater Than Food
Weekend Edition
February 15, 2019
Friday - Sunday
Matthew Hoh
Time for Peace in Afghanistan and an End to the Lies
Chris Floyd
Pence and the Benjamins: An Eternity of Anti-Semitism
Rob Urie
The Green New Deal, Capitalism and the State
Jim Kavanagh
The Siege of Venezuela and the Travails of Empire
Paul Street
Someone Needs to Teach These As$#oles a Lesson
Andrew Levine
World Historical Donald: Unwitting and Unwilling Author of The Green New Deal
Jeffrey St. Clair
Roaming Charges: Third Rail-Roaded
Eric Draitser
Impacts of Exploding US Oil Production on Climate and Foreign Policy
Ron Jacobs
Maduro, Guaidó and American Exceptionalism
John Laforge
Nuclear Power Can’t Survive, Much Less Slow Climate Disruption
Joyce Nelson
Venezuela & The Mighty Wurlitzer
Jonathan Cook
In Hebron, Israel Removes the Last Restraint on Its Settlers’ Reign of Terror
Ramzy Baroud
Enough Western Meddling and Interventions: Let the Venezuelan People Decide
Robert Fantina
Congress, Israel and the Politics of “Righteous Indignation”
Dave Lindorff
Using Students, Teachers, Journalists and other Professionals as Spies Puts Everyone in Jeopardy
Kathy Kelly
What it Really Takes to Secure Peace in Afghanistan
Brian Cloughley
In Libya, “We Came, We Saw, He Died.” Now, Maduro?
Nicky Reid
The Councils Before Maduro!
Gary Leupp
“It’s All About the Benjamins, Baby”
Jon Rynn
What a Green New Deal Should Look Like: Filling in the Details
David Swanson
Will the U.S. Senate Let the People of Yemen Live?
Dana E. Abizaid
On Candace Owens’s Praise of Hitler
Raouf Halaby
‘Tiz Kosher for Elected Jewish U.S. Officials to Malign
Rev. William Alberts
Trump’s Deceitful God-Talk at the Annual National Prayer Breakfast
W. T. Whitney
Caribbean Crosswinds: Revolutionary Turmoil and Social Change 
ADRIAN KUZMINSKI
Avoiding Authoritarian Socialism
Howard Lisnoff
Anti-Semitism, Racism, and Anti-immigrant Hate
Ralph Nader
The Realized Temptations of NPR and PBS
Cindy Garcia
Trump Pledged to Protect Families, Then He Deported My Husband
Thomas Knapp
Judicial Secrecy: Where Justice Goes to Die
Louis Proyect
The Revolutionary Films of Raymundo Gleyzer
Sarah Anderson
If You Hate Campaign Season, Blame Money in Politics
Victor Grossman
Contrary Creatures
Tamara Pearson
Children Battling Unhealthy Body Images Need a Different Narrative About Beauty
Peter Knutson
The Salmon Wars in the Pacific Northwest: Banning the Rough Customer
Binoy Kampmark
Means of Control: Russia’s Attempt to Hive Off the Internet
Robert Koehler
The Music That’s in All of Us
Norah Vawter
The Kids Might Save Us
Tracey L. Rogers
Freedom for All Begins With Freedom for the Most Marginalized
Paul Armentano
Marijuana Can Help Fight Opioid Abuse
Tom Clifford
Britain’s Return to the South China Sea
Graham Peebles
Young People Lead the Charge to Change the World
Matthew Stevenson
A Pacific Odyssey: Around General MacArthur’s Manila Stage Set
B. R. Gowani
Starbucks Guy Comes Out to Preserve Billionaire Species
FacebookTwitterGoogle+RedditEmail